Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 01:22

General

  • Target

    Iris-Installer-3.0.2.jar

  • Size

    1.6MB

  • MD5

    e4d38fe7bf9f93cff304995d5dcc570d

  • SHA1

    211e033be8ef1a459fbc14b69fa8a841d84de299

  • SHA256

    91c1d1cd620b57b72057983766a325ec463e3a9f7d03ffe249d31cbf4359bb1e

  • SHA512

    54295dcde7cd794633aeaed75190dc98201f44c218516c3a2de98979c3e5abc90b9c2958702206b3d47eb6b1df7dfc58cba333fa668b494884e850047800e2b0

  • SSDEEP

    49152:TXVvrbFGaS9eZ/m+e/+VQODmWjLG8zaCRbBseXLezG:TXVvrB49ex1mqPU6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Iris-Installer-3.0.2.jar
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SYSTEM32\reg.exe
      reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v AppsUseLightTheme
      2⤵
        PID:1632

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-5051011046000.dll

      Filesize

      9KB

      MD5

      b0366e31f3704da1e9552633a07f77db

      SHA1

      fd3058cc08a5e00b56301dc44e0e05854a5e55ea

      SHA256

      18f1f5afec89f152afe1c57cffe9a77c158d840f6e00ec7a343b685caa3d8853

      SHA512

      d8e621eb9b15103a70544affbd7e3fdf52fe14bdae754fd9551508ed8785d53b6205082de41a575acffe5d1c80d419eda16d79834fdbad9cc8df798dcaa4eaa4

    • memory/2212-40-0x00000000008F0000-0x00000000008F1000-memory.dmp

      Filesize

      4KB

    • memory/2212-43-0x00000000028B0000-0x00000000028C0000-memory.dmp

      Filesize

      64KB

    • memory/2212-31-0x0000000002620000-0x0000000003620000-memory.dmp

      Filesize

      16.0MB

    • memory/2212-33-0x0000000002620000-0x0000000003620000-memory.dmp

      Filesize

      16.0MB

    • memory/2212-39-0x0000000002620000-0x0000000003620000-memory.dmp

      Filesize

      16.0MB

    • memory/2212-4-0x0000000002620000-0x0000000003620000-memory.dmp

      Filesize

      16.0MB

    • memory/2212-42-0x00000000028A0000-0x00000000028B0000-memory.dmp

      Filesize

      64KB

    • memory/2212-14-0x00000000008F0000-0x00000000008F1000-memory.dmp

      Filesize

      4KB

    • memory/2212-44-0x00000000028F0000-0x0000000002900000-memory.dmp

      Filesize

      64KB

    • memory/2212-46-0x00000000028E0000-0x00000000028F0000-memory.dmp

      Filesize

      64KB

    • memory/2212-45-0x0000000002910000-0x0000000002920000-memory.dmp

      Filesize

      64KB

    • memory/2212-48-0x0000000002620000-0x0000000003620000-memory.dmp

      Filesize

      16.0MB

    • memory/2212-47-0x0000000002920000-0x0000000002930000-memory.dmp

      Filesize

      64KB

    • memory/2212-49-0x0000000002620000-0x0000000003620000-memory.dmp

      Filesize

      16.0MB